摘要 :
This paper is a brief description for shared LANs & switched LANs. Shared LANs, such as Ethernet, Token Ring, etc. , appeared in the middle of the 1980's. Because of the discovery of popular telephone line linking to LANs in 1985, the complexity and the cost of networks dropped down greatly. Tn the beginning of 1990's, the development of applications made the fact that the networks were out of date no matter the people used the microsegment or the '80/ 20' regularity. Along with the appearance of switched LANs in 1993, shared LANs have gone to their end. Switched LANs not only solve the bottleneck problem in network transportation but also make the virtual LANs possible. This paper also makes a brief description for the following networks in China: CASnet, Five-Institute net, D and R university campus networks in discussion, ATM as the backbone of campus network. We can draw a conclusion from this description that the computer networking of our country have got into switched LANs and virtual LANs from shared LANs....
展开
This paper is a brief description for shared LANs & switched LANs. Shared LANs, such as Ethernet, Token Ring, etc. , appeared in the middle of the 1980's. Because of the discovery of popular telephone line linking to LANs in 1985, the complexity and the cost of networks dropped down greatly. Tn the beginning of 1990's, the development of applications made the fact that the networks were out of date no matter the people used the microsegment or the '80/ 20' regularity. Along with the appearance of switched LANs in 1993, shared LANs have gone to their end. Switched LANs not only solve the bottleneck problem in network transportation but also make the virtual LANs possible. This paper also makes a brief description for the following networks in China: CASnet, Five-Institute net, D and R university campus networks in discussion, ATM as the backbone of campus network. We can draw a conclusion from this description that the computer networking of our country have got into switched LANs and virtual LANs from shared LANs.
收起
摘要 :
This paper is a brief description for shared LANs & switched LANs. Shared LANs, such as Ethernet, Token Ring, etc. , appeared in the middle of the 1980's. Because of the discovery of popular telephone line linking to LANs in 1985, the complexity and the cost of networks dropped down greatly. Tn the beginning of 1990's, the development of applications made the fact that the networks were out of date no matter the people used the microsegment or the '80/ 20' regularity. Along with the appearance of switched LANs in 1993, shared LANs have gone to their end. Switched LANs not only solve the bottleneck problem in network transportation but also make the virtual LANs possible.
This paper also makes a brief description for the following networks in China: CASnet, Five-Institute net, D and R university campus networks in discussion, ATM as the backbone of campus network. We can draw a conclusion from this description that the computer networking of our country have got into switched LANs and virtual LANs from shared LANs....
展开
This paper is a brief description for shared LANs & switched LANs. Shared LANs, such as Ethernet, Token Ring, etc. , appeared in the middle of the 1980's. Because of the discovery of popular telephone line linking to LANs in 1985, the complexity and the cost of networks dropped down greatly. Tn the beginning of 1990's, the development of applications made the fact that the networks were out of date no matter the people used the microsegment or the '80/ 20' regularity. Along with the appearance of switched LANs in 1993, shared LANs have gone to their end. Switched LANs not only solve the bottleneck problem in network transportation but also make the virtual LANs possible.
This paper also makes a brief description for the following networks in China: CASnet, Five-Institute net, D and R university campus networks in discussion, ATM as the backbone of campus network. We can draw a conclusion from this description that the computer networking of our country have got into switched LANs and virtual LANs from shared LANs.
收起
摘要 :
LAN Platform is application software based on UDP for LAN chat software, set the mainstream communication functions into one body, play LAN stability, quick advantage, provide interactive communication platform for LAN users. The ...
展开
LAN Platform is application software based on UDP for LAN chat software, set the mainstream communication functions into one body, play LAN stability, quick advantage, provide interactive communication platform for LAN users. The software does not require a server, start the engine and the current online users, the software also provides cross network game search function, provides for the majority of War3 lovers convenient battle platform.
收起
摘要 :
The rapid growth of wireless communication technology has accelerated the development of networks and services using wired and wireless communication technology. Among such services, the Wireless LAN (WLAN) service is being widely...
展开
The rapid growth of wireless communication technology has accelerated the development of networks and services using wired and wireless communication technology. Among such services, the Wireless LAN (WLAN) service is being widely used due to its compatibility with legacy wired networks and its unique extensibility. While most of WLAN products are currently based on 802.1x, WPA security standard, products compatible to the recently standardized 802.11i are also expected to come in the near future. In addition, as the speed and security of WLAN improves, many services that used to be provided in the cable sector are expected to be serviced wirelessly in a relatively secure environment. Despite the many advantages of WLAN, many business and government offices are reluctant to install WLAN mainly due to security concerns. In addition to the additional cost for installation, WLAN has been criticized as being less secure compared to wired networks. In response to such concerns, the NIST, the ITRC of DoD, and CSE of Canada have presented security vulnerabilities of WLAN and example cases. In Korea, the Korean Information Security Agency (KISA) has announced security actions for each WLAN service type and network configuration and is providing secure operation guidelines to the general public. This study introduces foreign WLAN security measures and presents the main contents and direction of Korean guidelines for preventing WLAN intrusions.
收起
摘要 :
The rapid growth of wireless communication technology has accelerated the development of networks and services using wired and wireless communication technology. Among such services, the Wireless LAN (WLAN) service is being widely...
展开
The rapid growth of wireless communication technology has accelerated the development of networks and services using wired and wireless communication technology. Among such services, the Wireless LAN (WLAN) service is being widely used due to its compatibility with legacy wired networks and its unique extensibility. While most of WLAN products are currently based on 802.1x, WPA security standard, products compatible to the recently standardized 802.11i are also expected to come in the near future. In addition, as the speed and security of WLAN improves, many services that used to be provided in the cable sector are expected to be serviced wirelessly in a relatively secure environment. Despite the many advantages of WLAN, many business and government offices are reluctant to install WLAN mainly due to security concerns. In addition to the additional cost for installation, WLAN has been criticized as being less secure compared to wired networks. In response to such concerns, the NIST, the ITRC of DoD, and CSE of Canada have presented security vulnerabilities of WLAN and example cases. In Korea, the Korean Information Security Agency (KISA) has announced security actions for each WLAN service type and network configuration and is providing secure operation guidelines to the general public. This study introduces foreign WLAN security measures and presents the main contents and direction of Korean guidelines for preventing WLAN intrusions.
收起
摘要 :
The rapid growth of wireless communication technology has accelerated the development of networks and services using wired and wireless communication technology. Among such services, the Wireless LAN (WLAN) service is being widely...
展开
The rapid growth of wireless communication technology has accelerated the development of networks and services using wired and wireless communication technology. Among such services, the Wireless LAN (WLAN) service is being widely used due to its compatibility with legacy wired networks and its unique extensibility. While most of WLAN products are currently based on 802.1x, WPA security standard, products compatible to the recently standardized 802.11i are also expected to come in the near future. In addition, as the speed and security of WLAN improves, many services that used to be provided in the cable sector are expected to be serviced wirelessly in a relatively secure environment. Despite the many advantages of WLAN, many business and government offices are reluctant to install WLAN mainly due to security concerns. In addition to the additional cost for installation, WLAN has been criticized as being less secure compared to wired networks. In response to such concerns, the NIST, the ITRC of DoD, and CSE of Canada have presented security vulnerabilities of WLAN and example cases. In Korea, the Korean Information Security Agency (KISA) has announced security actions for each WLAN service type and network configuration and is providing secure operation guidelines to the general public. This study introduces foreign WLAN security measures and presents the main contents and direction of Korean guidelines for preventing WLAN intrusions.
收起
摘要 :
The rapid growth of wireless communication technology has accelerated the development of networks and services using wired and wireless communication technology. Among such services, the Wireless LAN (WLAN) service is being widely...
展开
The rapid growth of wireless communication technology has accelerated the development of networks and services using wired and wireless communication technology. Among such services, the Wireless LAN (WLAN) service is being widely used due to its compatibility with legacy wired networks and its unique extensibility. While most of WLAN products are currently based on 802.1x, WPA security standard, products compatible to the recently standardized 802.11i are also expected to come in the near future. In addition, as the speed and security of WLAN improves, many services that used to be provided in the cable sector are expected to be serviced wirelessly in a relatively secure environment. Despite the many advantages of WLAN, many business and government offices are reluctant to install WLAN mainly due to security concerns. In addition to the additional cost for installation, WLAN has been criticized as being less secure compared to wired networks. In response to such concerns, the NIST, the ITRC of DoD, and CSE of Canada have presented security vulnerabilities of WLAN and example cases. In Korea, the Korean Information Security Agency (KISA) has announced security actions for each WLAN service type and network configuration and is providing secure operation guidelines to the general public. This study introduces foreign WLAN security measures and presents the main contents and direction of Korean guidelines for preventing WLAN intrusions.
收起
摘要 :
since the data's transmission is through the LAN. When we need backup a larger amount of data, backup time window is tight. The network is vulnerable to be congested. In the SAN environment, we can use LAN-Free backup of storage n...
展开
since the data's transmission is through the LAN. When we need backup a larger amount of data, backup time window is tight. The network is vulnerable to be congested. In the SAN environment, we can use LAN-Free backup of storage network. In this article, I mainly introduce the design and presentation of LAN-Free backup program.
收起
摘要 :
The purpose of the technical solution is to offer network infrastructure, which is able to meet the requirements of Bulgarian data protection authority for number of users, network traffic for general purposes and special applicat...
展开
The purpose of the technical solution is to offer network infrastructure, which is able to meet the requirements of Bulgarian data protection authority for number of users, network traffic for general purposes and special applications, reliability, flexibility, good performance and security.
收起
摘要 :
Communication infrastructure in substations and control centres of Transmission System Operators should be designed in order to support variety of applications and users with different priorities and requirements. Communication re...
展开
Communication infrastructure in substations and control centres of Transmission System Operators should be designed in order to support variety of applications and users with different priorities and requirements. Communication requirements vary regarding capacity, maximum response times, availability, reliability and security. Up until a few years ago majority of process control systems communicated through serial links.
收起